Show filters
102 Total Results
Displaying 11-20 of 102
Sort by:
Attacker Value
Unknown
CVE-2020-26200
Disclosure Date: February 26, 2021 (last updated November 28, 2024)
A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due to insufficient check of their authenticity. This component is incorporated in Kaspersky Rescue Disk (KRD) and was trusted by the Authentication Agent of Full Disk Encryption in Kaspersky Endpoint Security (KES). This issue allowed to bypass the UEFI Secure Boot security feature. An attacker would need physical access to the computer to exploit it. Otherwise, local administrator privileges would be required to modify the boot loader component.
0
Attacker Value
Unknown
CVE-2020-36200
Disclosure Date: January 26, 2021 (last updated November 28, 2024)
TinyCheck before commits 9fd360d and ea53de8 allowed an authenticated attacker to send an HTTP GET request to the crafted URLs.
0
Attacker Value
Unknown
CVE-2020-36199
Disclosure Date: January 26, 2021 (last updated November 28, 2024)
TinyCheck before commits 9fd360d and ea53de8 was vulnerable to command injection due to insufficient checks of input parameters in several places.
0
Attacker Value
Unknown
CVE-2020-35929
Disclosure Date: January 19, 2021 (last updated November 28, 2024)
In TinyCheck before commits 9fd360d and ea53de8, the installation script of the tool contained hard-coded credentials to the backend part of the tool. This information could be used by an attacker for unauthorized access to remote data.
0
Attacker Value
Unknown
CVE-2020-28950
Disclosure Date: December 04, 2020 (last updated November 28, 2024)
The installer of Kaspersky Anti-Ransomware Tool (KART) prior to KART 4.0 Patch C was vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges during installation process.
0
Attacker Value
Unknown
CVE-2020-25045
Disclosure Date: September 02, 2020 (last updated November 28, 2024)
Installers of Kaspersky Security Center and Kaspersky Security Center Web Console prior to 12 & prior to 12 Patch A were vulnerable to a DLL hijacking attack that allowed an attacker to elevate privileges in the system.
0
Attacker Value
Unknown
CVE-2020-25043
Disclosure Date: September 02, 2020 (last updated November 28, 2024)
The installer of Kaspersky VPN Secure Connection prior to 5.0 was vulnerable to arbitrary file deletion that could allow an attacker to delete any file in the system.
0
Attacker Value
Unknown
CVE-2020-25044
Disclosure Date: September 02, 2020 (last updated November 28, 2024)
Kaspersky Virus Removal Tool (KVRT) prior to 15.0.23.0 was vulnerable to arbitrary file corruption that could provide an attacker with the opportunity to eliminate content of any file in the system.
0
Attacker Value
Unknown
CVE-2019-15689
Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products
0
Attacker Value
Unknown
CVE-2019-15687
Disclosure Date: November 26, 2019 (last updated November 27, 2024)
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user's system (like Windows version and version of the product, host unique ID). Information Disclosure.
0